Main Page | See live article | Alphabetical index

End-to-end

In any computer communication, there are n >= 2 end points, called "end systems" or "hosts".

End-to-end in e-commerce, connects people want to sell and buy. Eliminates the layers of middlemen who extract value from the trade and increase the final price.

End-to-end security means that sensitive data is encrypted all the way from your device side application back to the enterprise. Rather than relying on transport-level security such as SSL, end-to-end security puts the power of strong encryption in your hands, all through a simple interface. This ends the so-called “air gap” where sensitive data was previously decrypted at the gateway during translation for wireless protocols into Internet protocols.

End-to-end monitoring is the process of attempting to access a web server or other Internet device from across the Internet, just as a real end user would, to verify that the server is accessible and functioning properly at all times. This approach can be used instead of, or as a complement to, local monitoring software run by the Web Administrator.

See also: end-to-end principle.